Get my own profile
Public access
View all20 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Edwin HancockEmeritus Professor, Department of Computer Science, University of York, UKVerified email at cs.york.ac.uk
Jun ZhouSchool of Information and Communication Technology, Griffith UniversityVerified email at griffith.edu.au
Cong Phuoc HuynhSenior Applied Scientist at Prime Video & Amazon StudiosVerified email at amazon.com
Zhouyu FuLead Researcher, Microsoft Research AsiaVerified email at microsoft.com
Lin GuResearch Scientist, RIKEN AIP, University of TokyoVerified email at mi.t.u-tokyo.ac.jp
Andrea TORSELLOProfessor of Computer Science, Universitą Ca' Foscari VeneziaVerified email at unive.it
YOU ShaodiAssociate Professor, University of AmsterdamVerified email at uva.nl
Yuntao QianProfessor of Computer Science, Zhejiang UniversityVerified email at zju.edu.cn
Sen JiaShenzhen universityVerified email at szu.edu.cn
Ran WeiDATA61/CSIROVerified email at csiro.au
Mengmeng GeUniversity of CanterburyVerified email at canterbury.ac.nz
Zubair BaigAssociate Professor, Cyber-Security, Deakin University, Melbourne, AustraliaVerified email at deakin.edu.au
Richard C WilsonDepartment of Computer Science, University of YorkVerified email at york.ac.uk
Terry CaelliDeakin UniversityVerified email at deakin.edu.au
Mark PickeringUNSW CanberraVerified email at adfa.edu.au
Junxuan LiResearch Scientist, Codec Avatars Lab, MetaVerified email at meta.com
Hongdong LiProfessor of Computer Vision and Machine Learning, ANU, and Amazon IMLVerified email at anu.edu.au
Bin LuoAnhui University, University of YorkVerified email at ahu.edu.cn
Sejuti RahmanUniversity of DhakaVerified email at du.ac.bd
Surya PrakashSenior Lecturer, University of the South Pacific,FijiVerified email at usp.ac.fj
Follow
Antonio Robles-Kelly
School of Information Technology, Deakin University
Verified email at deakin.edu.au - Homepage